Security Spotlight: Cyber Trust Mark

5 Experts. 40 Minutes. 20+ Burning Questions.

The Cyber Trust Mark is redefining security and privacy for the Internet of Things (IoT). But what does it mean for manufacturers? Join us January 24 to find out.

IoT-related security risks threaten households, privacy, and consumer trust. But regulators are fighting back. The Cyber Trust Mark sets a new standard for device security.

But what does the program entail? How does certification work? What kinds of threats do manufacturers need to be aware of? And — most importantly — how will the Cyber Trust Mark impact the future of the Internet of Things?

In 40 minutes, you'll hear industry experts answer all these questions — and learn everything you need to know about securing connected devices.


Handouts

Solution Brief: Keysight IoT Security Assessment View Download

Presenters

  • Tatyana Bolton
    Google
    Tatyana Bolton is a Security Policy Manager at Google in the Security Center of Excellence where she helps drive global, enterprise-wide cybersecurity efforts in connected device security and cyber workforce efforts. She also leads Google’s Asia Pacific cybersecurity policy, developing cybersecurity strategy and engagement on key policy priorities.
  • Kevin Kraus
    Yale and August US
    Kevin is VP of Technology Alliances and IoT Business Development for Yale and August's Residential Electronic Lock Business. An expert in defining key product technologies and developing partner integration strategies and tools to support seamless lock integration, Kevin also serves as Vice Chair of the Board for the Connectivity Standards Alliance.
  • Bret Jordan
    Afero
    Afero's Chief Security Strategist, Bret is an experienced technical business executive with a passion for building amazing and secure products — as well as the teams needed to produce them. Over the years, he's led initiatives to drive innovation, create new technologies, and design automated and collaborative cyber threat intelligence and mitigation / remediation solutions.
  • Scott Register
    VP, Security Solutions at Keysight Technologies
    Scott leads Keysight’s Security Solutions Team. With experience spanning successful startups and global security companies, he has a proven record of developing innovative solutions — combining leading-edge technology with remarkable usability. A self-professed "idea guy", he believes if you're not making work fun, you’re doing something wrong.
  • Mike Hodge
    Solutions Lead, Emulator Portfolio at Keysight Technologies
    Mike is a self-professed geek and Solutions Lead for Keysight’s emulator portfolio. He believes you don't need pretentious jargon to make technology interesting or accessible. Distilling complex topics like cybersecurity down to layman’s terms, he’s never met a story he wasn’t interested in telling. When he’s not working, you’ll probably find him somewhere in the mountains.

Register to watch on demand

Error: Please enter your first name.
Error: Please enter your last name.
This field is required.
This field is required.
This field is required.
This field is required.
Webinar: Security Spotlight: Cyber Trust Mark by Keysight